CEH v11: DoS, DDoS, Volumetric & Protocol Attacks
Ethical Hacker v11
| Intermediate
- 3 videos | 50m 9s
- Includes Assessment
- Earns a Badge
Denial of Service attacks can be very disruptive to an organization both monetarily and reputationally. In this course, you'll explore Denial of Service and Distributed Denial of Service attacks, as well as common DoS techniques and categories and common tools used to perform them. Next, you'll examine volumetric DoS attacks, which are one of the more common types deployed by attackers. These include UDP flood, Ping of Death, Smurf, and Pulse Wave. Finally, you'll learn about protocol-based DoS attacks, including SYN floods, ACK floods, and fragmentation attacks. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.
WHAT YOU WILL LEARN
-
identify the types of denial of service (DoS) attacksidentify the tools used to perform a denial-of-service attackrecognize the different volumetric attack typesidentify a command to perform a ping of death attack
-
recognize the command to issue to perform a UDP flood attackrecognize the different types of flood attacksidentify the different types of DoS attacksidentify the command to perform a SYN flood attack
IN THIS COURSE
-
1.DoS and DDoS Attacks12m 16s
-
2.Volumetric Attacks20m 42s
-
3.Protocol Attacks17m 11s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.